Formal Analysis for Network Security Properties on a Trace Semantics

被引:0
|
作者
Jiang, Yun [1 ]
Liu, Xifa [2 ,3 ]
机构
[1] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Peoples R China
[2] Wuhan Univ, Sch Polit & Pul Adm, Wuhan 430027, Peoples R China
[3] Jiangxi Univ Finance & Econ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
关键词
D O I
10.1109/ICACTE.2008.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Formal method has been advocated as an important means of improving the safety and reliability of software systems, especial those which are safety-critical. We propose a new simple trace semantics that can be used to specify security propertics. Our technique support a protocol designer to provide formal Analysis of the security propertics. We illustrate the utility of our technique by exposing two attacks on the well studied protocol TMN.
引用
收藏
页码:957 / +
页数:3
相关论文
共 50 条
  • [1] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [2] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [3] Formal analysis methods of network security design
    Stawowski, Mariusz
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
  • [4] Cryptographic protocol logic for analyzing a variety of security properties and its formal semantics
    Chen, Li
    Li, Xiangdong
    International Journal of Advancements in Computing Technology, 2012, 4 (11) : 283 - 293
  • [5] A formal model for network-wide security analysis
    Matousek, Petr
    Rab, Jaroslav
    Rysavy, Ondrej
    Sveda, Miroslav
    FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2008, : 171 - 181
  • [6] SOME FORMAL PROPERTIES OF INDIRECT SEMANTICS
    MARTIN, JN
    THEORETICAL LINGUISTICS, 1985, 12 (01) : 1 - 32
  • [7] A formal system for analysis of cryptographic encryption and their security properties
    Hagihara, F
    Hagihara, S
    Yonezaki, N
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 87 - 112
  • [8] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [9] First Results of a Formal Analysis of the Network Time Security Specification
    Teichel, Kristof
    Sibold, Dieter
    Milius, Stefan
    SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 218 - 245
  • [10] Towards the Formal Verification of Security Properties of a Network-on-Chip Router
    Sepulveda, Johanna
    Aboul-Hassan, Damian
    Sigl, Georg
    Becker, Bernd
    Sauer, Matthias
    2018 23RD IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2018,