期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
Formal Verification Platform as a Service:WebAssembly Vulnerability Detection Application
1
作者 LiangJun Deng Hang Lei +6 位作者 Zheng Yang WeiZhong Qian XiaoYu Li Hao Wu Sihao Deng RuChao Sha WeiDong Deng 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2155-2170,共16页
In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work build... In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work builds a Hyperledger Fabric blockchain runtime model.It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages.This methodology utilizes an external application programming interface(API)table to replace the source codes in compilation,thereby pruning the part of housekeeping codes to ease code inflation.Code inflation is a significant metric in formal language translation.Namely,minor code inflation enhances verification scale and performance efficiency.It determines the efficiency of formal verification,involving launching,running,and memory usage.For instance,path explosion increases exponentially,resulting in out-of-memory.The experimental results conclude that program languages like golang severely impact code inflation.FVPS reduces the wasm code size by over 90%,achieving two orders of optimization magnitude,from 2000 kilobyte(KB)to 90 KB.That means we can cope with golang applications up to 20 times larger than the original in scale.This work eliminates the gap between Hyperledger Fabric smart contracts and WebAssembly.Our approach is pragmatic,adaptable,extendable,and flexible.Nowadays,FVPS is successfully applied in a Railway-Port-Aviation blockchain transportation system. 展开更多
关键词 WebAssembly formal verification blockchain smart contract
下载PDF
Formal Verification under Unknown Constraints 被引量:1
2
作者 LI Guang-hui 1,2,3 , LI Xiao-wei 2,31. School of Information Engineering, Zhejiang Forestry College, Hangzhou 311300, Zhejiang, China 2. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China 3. Graduate School of the Chinese Academy of Sciences, Beijing 100039, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期43-46,共4页
We present a formal method of verifying designs with unknown constraints (e.g., black boxes) using Boolean satisfiability (SAT). This method is based on a new encoding scheme of unknown constraints, and solves the cor... We present a formal method of verifying designs with unknown constraints (e.g., black boxes) using Boolean satisfiability (SAT). This method is based on a new encoding scheme of unknown constraints, and solves the corresponding conjunctive normal form (CNF) formulas.Furthermore,this method can avoid the potential memory explosion, which the binary decision diagram (BDD) based techniques maybe suffer from, thus it has the capacity of verifying large designs. Experimental results demonstrate the efficiency and feasibility of the proposed method. 展开更多
关键词 formal verification unknown constraints black box Boolean satisfiability Boolean comparison
下载PDF
Formal Verification of the Merchant Registration Phase of the SET Protocol 被引量:1
3
作者 Xiao-Qi Ma Xiao-Chun Cheng 《International Journal of Automation and computing》 EI 2005年第2期155-162,共8页
This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the s... This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the secrecy of online purchases. A number of concepts, notations, functions, predicates, assumptions and rules are introduced. We describe the knowledge of all legal participants, and a malicious spy, to assess the security of the sub-protocol. Avoiding search in a large state space, the method converges very quickly. We implemented our method in the Isabelle/Isar automated reasoning environment, therefore the whole verification process can be executed mechanically and efficiently. Keywords Formal verification - electronic transaction protocol - knowledge-based system This work was supported by EC, EPSRC, the National Natural Science Foundation of China (No.60496320, 60496321), and Hong Kong K C Wang Education Foundation.Xiao-Qi Ma graduated from Nanjing University of Science and Technology, China, in 1997. He received his Master’s degree from the Institute of Software, Chinese Academy of Sciences in 2003. He is currently a PhD student at the University of Reading. His research interests include computer network security, knowledge-based systems, and operating systems.Xiao-Chun Cheng obtained his PhD in 1996. He has worked as a lecturer at the University of Reading since 2000. He is a guest professor at North East Normal University and Beijing Normal University. His research interests include theoretical and applied aspects in decision support systems, knowledge-based systems and intelligent systems. 展开更多
关键词 formal verification electronic transaction protocol knowledge-based system
下载PDF
Formal Verification of TASM Models by Translating into UPPAAL 被引量:1
4
作者 胡凯 张腾 +3 位作者 杨志斌 顾斌 蒋树 姜泮昌 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期51-54,共4页
Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activitie... Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activities by translating into UPPAAL. Firstly, the translational semantics from TASM to UPPAAL is presented through atlas transformation language(ATL). Secondly, the implementation of the proposed model transformation tool TASM2UPPAAL is provided. Finally, a case study is given to illustrate the automatic transformation from TASM model to UPPAAL model. 展开更多
关键词 timed abstract state machine(TASM) formal verification model transformation atlas transformation language(ATL) UPPAAL
下载PDF
Refinement modeling and verification of secure operating systems for communication in digital twins
5
作者 Zhenjiang Qian Gaofei Sun +1 位作者 Xiaoshuang Xing Gaurav Dhiman 《Digital Communications and Networks》 SCIE CSCD 2024年第2期304-314,共11页
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations. 展开更多
关键词 Theorem proving Isabelle/HOL formal verification System modeling Correctness verification
下载PDF
Formal verification of synchronous data-flow program transformations toward certified compilers 被引量:8
6
作者 Van Chan NGO Jean-Pierre TALPIN +2 位作者 Thierry GAUTIER Paul Le GUERNIC Loic BESNARD 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第5期598-616,共19页
Translation validation was invented in the 90's by Pnueli et al. as a technique to formally verify the correctness of code generators. Rather than certifying the code generator or exhaustively qualifying it, translat... Translation validation was invented in the 90's by Pnueli et al. as a technique to formally verify the correctness of code generators. Rather than certifying the code generator or exhaustively qualifying it, translation validators attempt to verify that program transformations preserve semantics. In this work, we adopt this approach to formally verify that the clock semantics and data dependence are preserved during the compilation of the Signal compiler. Translation valida- tion is implemented for every compilation phase from the initial phase until the latest phase where the executable code is generated, by proving the transformation in each phase of the compiler preserves the semantics. We represent the clock semantics, the data dependence of a program and its trans- formed counterpart as first-order formulas which are called clock models and synchronous dependence graphs (SDGs), respectively. We then introduce clock refinement and depen- dence refinement relations which express the preservations of clock semantics and dependence, as a relation on clock mod- els and SDGs, respectively. Our validator does not require any instrumentation or modification of the compiler, nor any rewriting of the source program. 展开更多
关键词 formal verification translation validation certi-fied compiler multi-clocked synchronous programs embed-ded systems.
原文传递
Formal Verification of Temporal Properties for Reduced Overhead in Grid Scientific Workflows 被引量:2
7
作者 曹军威 张帆 +2 位作者 许可 刘连臣 吴澄 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第6期1017-1030,共14页
With quick development of grid techniques and growing complexity of grid applications, it is becoming critical for reasoning temporal properties of grid workflows to probe potential pitfalls and errors, in order to en... With quick development of grid techniques and growing complexity of grid applications, it is becoming critical for reasoning temporal properties of grid workflows to probe potential pitfalls and errors, in order to ensure reliability and trustworthiness at the initial design phase. A state Pi calculus is proposed and implemented in this work, which not only enables fexible abstraction and management of historical grid verification of grid workflows. Furthermore, a relaxed region system events, but also facilitates modeling and temporal analysis (RRA) approach is proposed to decompose large scale grid workflows into sequentially composed regions with relaxation of parallel workflow branches, and corresponding verification strategies are also decomposed following modular verification principles. Performance evaluation results show that the RRA approach can dramatically reduce CPU time and memory usage of formal verification. 展开更多
关键词 grid computing workflow management formal verification state Pi calculus
原文传递
Design and formal verification of a CEM protoco with transparent TTP 被引量:1
8
作者 Zhiyuan LIU Jun PANG Chenyi ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第2期279-297,共19页
In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et ... In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security require- ment which helps to avoid bad publicity as well as protecting individual users' privacy. Cederquist et al. proposed an opti- mistic certified email protocol, which employs key chains to reduce the storage requirement of the TTE We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An imple- mentation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satis- fying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended pro- tocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP trans- parency is formalised and analysed using the toolsets/~CRL and CADE 展开更多
关键词 fair exchange CEM protocols FAIRNESS TTPtransparency formal verification
原文传递
A Formal Method for Service Choreography Verification Based on Description Logic
9
作者 Tingting Zhang Yushi Lan +2 位作者 Minggang Yu Changyou Zheng Kun Liu 《Computers, Materials & Continua》 SCIE EI 2020年第2期893-904,共12页
Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model.This paper presents a new approa... Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model.This paper presents a new approach of choreography model verification based on Description Logic.A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography.Based on the framework,a set of rules and constraints are defined in Description Logic for choreography model verification.To automate model verification,the UML-based service choreography model will be transformed,by the given algorithms,into the DL-based ontology,and thus the model properties can be verified by reasoning through the ontology with the help of a popular DL reasoned.A case study is given to demonstrate applicability of the method.Furthermore,the work will be compared with other related research. 展开更多
关键词 Service choreography WS-CDL meta-concept model description logic formal verification
下载PDF
Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network 被引量:3
10
作者 XI Ning SUN Cong +2 位作者 MA Jianfeng CHEN Xiaofeng SHEN Yulong 《China Communications》 SCIE CSCD 2016年第4期119-130,共12页
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. 展开更多
关键词 information flow security service composition formal verification smart sensor network
下载PDF
Formal Development of Feedback Control System with Fault Accommodation
11
作者 Gao Jianping & Chen Zongji(Department of Automatic Control,Beijing University of Aeronautics and Astronautics, 100083, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第4期22-30,共9页
Control systems are vulnerable to faults in control loops where faults may cause abruptand damaging responses. These systems with fault accommodation are becoming more and moreimportant while appearing in flight contr... Control systems are vulnerable to faults in control loops where faults may cause abruptand damaging responses. These systems with fault accommodation are becoming more and moreimportant while appearing in flight control, robots control and nuclear reactor control etc, andcalling for more rigorous development approach. A formal approach is explored in this parer, basedon Extended Duration Calculus, for the development of such kind of systems. A typical exampleof control system with fault accommodation, two-level control system, is used for illstrating ourapproach. Its high level consists of an event-driven supervisor which reeds to the change of plant dueto faults occurrence, and its low level consists of normal controller, reconfigured controller and othercomponents with FDI (Fault Detection and Isolation) mechanism. Firstly performance and systemspecifications of the case are formulated in EDC; Then they are refined step wisely into specificationsof the supervisor and the low level components. Finally the whole system performance is verified inEDC framework. 展开更多
关键词 Control system Fault accommodation EDC REFINEMENT FDI formal verification
下载PDF
SUMMARIZATION OF BOOLEAN SATISFIABILITY VERIFICATION
12
作者 Qian Junyan Wu Juan +1 位作者 Zhao Lingzhong Guo Yunchuan 《Journal of Electronics(China)》 2014年第3期232-245,共14页
As a complementary technology to Binary Decision Diagram-based(BDD-based) symbolic model checking, the verification techniques on Boolean satisfiability problem have gained an increasing wide of applications over the ... As a complementary technology to Binary Decision Diagram-based(BDD-based) symbolic model checking, the verification techniques on Boolean satisfiability problem have gained an increasing wide of applications over the last few decades, which brings a dramatic improvement for automatic verification. In this paper, we firstly introduce the theory about the Boolean satisfiability verification, including the description on the problem of Boolean satisfiability verification, Davis-Putnam-Logemann-Loveland(DPLL) based complete verification algorithm, and all kinds of solvers generated and the logic languages used by those solvers. Moreover, we formulate a large number optimizations of technique revolutions based on Boolean SATisfiability(SAT) and Satisfiability Modulo Theories(SMT) solving in detail, including incomplete methods such as bounded model checking, and other methods for concurrent programs model checking. Finally, we point out the major challenge pervasively in industrial practice and prospect directions for future research in the field of formal verification. 展开更多
关键词 Boolean SATisfiability(SAT) Satisfiability Modulo Theories(SMT) Model checking formal verification
下载PDF
Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets
13
作者 Maryam Jamal Nazir Ahmad Zafar +3 位作者 Atta-ur-Rahman Dhiaa Musleh Mohammed A.Gollapalli Sghaier Chabani 《Computers, Materials & Continua》 SCIE EI 2022年第8期3331-3348,共18页
The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,... The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,with the growing malicious threats a secure communication between aircraft and controllers becomes highly important.This research serves as a starting point for integration of BB84 quantum protocol with petri nets for secure modeling and verification of takeoff procedure.The integrated model combines the BB84 quantum cryptographic protocol with powerful verification tool support offered by petri nets.To model certain important properties of BB84,a new variant of petri nets coined as Quantum Nets are proposed by defining their mathematical foundations and overall system dynamics,furthermore,some important system properties are also abstractly defined.The proposed QuantumNets are then applied for modeling of aircraft takeoff process by defining three quantum nets:namely aircraft,runway controller and gate controller.For authentication between quantum nets,the use of external places and transitions is demonstrated to describe the encryptiondecryption process of qubits stream.Finally,the developed takeoff quantum network is verified through simulation offered by colored petri-net(CPN)Tools.Moreover,reachability tree(RT)analysis is also performed to have greater confidence in feasibility and correctness of the proposed aircraft takeoff model through the Quantum Nets. 展开更多
关键词 Aircraft takeoff BB84 quantum cryptography PETRI-NETS quantum nets formal modeling and verification
下载PDF
A survey on formal specification and verification of separation kernels 被引量:1
14
作者 Yongwang ZHAO Zhibin YANG Dianfu MA 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第4期585-607,共23页
Abstract Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled information flows among ... Abstract Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled information flows among partitions. The application of separation kernels in critical domain demands the correctness of the kernel by formal verification. To the best of our knowledge, there is no survey paper on this topic. This paper presents an overview of formal specification and verification of separation kernels. We first present the back- ground including the concept of separation kernel and the comparisons among different kernels. Then, we survey the state of the art on this topic since 2000. Finally, we summa- rize research work by detailed comparison and discussion. 展开更多
关键词 real-time operating systems separation kernel survey formal specification formal verification
原文传递
Verify UML Statecharts with SMV 被引量:1
15
作者 Chen Hai yan 1, Dong Wei 1, Wang Ji 1,2 , Chen Huo wang 1 1 Department of Computer Science, National University of Defense Technology, Changsha 410073, China 2 State Key Laboratory for Software Engineering, Wuhan University, Wuhan 430072, C 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期183-190,共8页
Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML Statechar... Formal verification has been widely needed in the development of safety critical systems. In order to introduce the design verification activity in UML developing process, we have developed a verifier of UML Statecharts by using the model checker SMV. The approach is to transform a system model in UML Statecharts to one in SMV input language via an intermediate language and then to verify the system properties specified in CTL by invoking SMV. The current experiences, including the formal verification of a simplified directory based cache coherence protocol in UML Statecharts, show that automatic verification can be integrated as a new step of the software process nicely. 展开更多
关键词 formal verification UML statecharts EHA SMV
下载PDF
Mechanical Proofs about BW Multi-Party Contract Signing Protocol 被引量:1
16
作者 ZHANG Ningrong ZHANG Xingyuan WANG Yuanyuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1516-1520,共5页
We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many s... We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson's inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simuhaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL. 展开更多
关键词 formal verification multi-party contract signing protocol inductive approach MODEL
下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
17
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
下载PDF
AN ANT COLONY ALGORITHM FOR MINIMUM UNSATISFIABLE CORE EXTRACTION 被引量:1
18
作者 Zhang Jianmin Shen Shengyu Li Sikun 《Journal of Electronics(China)》 2008年第5期652-660,共9页
Explaining the causes of infeasibility of Boolean formulas has many practical applications in electronic design automation and formal verification of hardware.Furthermore,a minimum explanation of infeasibility that ex... Explaining the causes of infeasibility of Boolean formulas has many practical applications in electronic design automation and formal verification of hardware.Furthermore,a minimum explanation of infeasibility that excludes all irrelevant information is generally of interest.A smallest-cardinality unsatisfiable subset called a minimum unsatisfiable core can provide a succinct explanation of infea-sibility and is valuable for applications.However,little attention has been concentrated on extraction of minimum unsatisfiable core.In this paper,the relationship between maximal satisfiability and mini-mum unsatisfiability is presented and proved,then an efficient ant colony algorithm is proposed to derive an exact or nearly exact minimum unsatisfiable core based on the relationship.Finally,ex-perimental results on practical benchmarks compared with the best known approach are reported,and the results show that the ant colony algorithm strongly outperforms the best previous algorithm. 展开更多
关键词 Electronic Design Automation (EDA) formal verification of hardware Minimum unsatisfiable core Ant colony algorithm Maximal satisfiable subformula
下载PDF
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
19
作者 Somayeh Soltani Seyed Amin Hosseini Seno +1 位作者 Juli Rejito Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2022年第6期5891-5910,共20页
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab... Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority. 展开更多
关键词 Satellite communications AUTHENTICATION session key agreement secure communication security protocols formal verification
下载PDF
Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture 被引量:4
20
作者 Yuehua DAI Yi SHI Yong QI Jianbao REN Peijian WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第1期34-43,共10页
Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the... Virtual machine monitors (VMMs) play a central role in cloud computing. Their reliability and availability are critical for cloud computing. Virtualization and device emu- lation make the VMM code base large and the interface be- tween OS and VMM complex. This results in a code base that is very hard to verify the security of the VMM. For exam- ple, a misuse of a VMM hyper-call by a malicious guest OS can corrupt the whole VMM. The complexity of the VMM also makes it hard to formally verify the correctness of the system's behavior. In this paper a new VMM, operating sys- tem virtualization (OSV), is proposed. The multiprocessor boot interface and memory configuration interface are virtu- alized in OSV at boot time in the Linux kernel. After booting, only inter-processor interrupt operations are intercepted by OSV, which makes the interface between OSV and OS sim- ple. The interface is verified using formal model checking, which ensures a malicious OS cannot attack OSV through the interface. Currently, OSV is implemented based on the AMD Opteron multi-core server architecture. Evaluation re- sults show that Linux running on OSV has a similar perfor- mance to native Linux. OSV has a performance improvement of 4%-13% over Xen. 展开更多
关键词 virtual machine monitor model operating sys tem many core formal verification
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部