Formal Analysis for Network Security Properties on a Trace Semantics

被引:0
|
作者
Jiang, Yun [1 ]
Liu, Xifa [2 ,3 ]
机构
[1] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Peoples R China
[2] Wuhan Univ, Sch Polit & Pul Adm, Wuhan 430027, Peoples R China
[3] Jiangxi Univ Finance & Econ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
关键词
D O I
10.1109/ICACTE.2008.31
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Formal method has been advocated as an important means of improving the safety and reliability of software systems, especial those which are safety-critical. We propose a new simple trace semantics that can be used to specify security propertics. Our technique support a protocol designer to provide formal Analysis of the security propertics. We illustrate the utility of our technique by exposing two attacks on the well studied protocol TMN.
引用
收藏
页码:957 / +
页数:3
相关论文
共 50 条
  • [31] Formal Semantics and Verification of Network-Based Biocomputation Circuits
    Aluf-Medina, Michelle
    Korten, Till
    Raviv, Avraham
    Nicolau, Dan V., Jr.
    Kugler, Hillel
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2021, 2021, 12597 : 464 - 485
  • [32] Formal security policy implementations in network firewalls
    Macfarlane, Richard
    Buchanan, William
    Ekonomou, Elias
    Uthmani, Omair
    Fan, Lu
    Lo, Owen
    COMPUTERS & SECURITY, 2012, 31 (02) : 253 - 270
  • [33] FORMAL SECURITY PROOF FOR A SCHEME ON A TOPOLOGICAL NETWORK
    Civino, Roberto
    Longo, Riccardo
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, : 562 - 571
  • [34] A Formal Framework for Network Security Design Synthesis
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 560 - 570
  • [35] Revisiting Semantics of Interactions for Trace Validity Analysis
    Mahe, Erwan
    Gaston, Christophe
    Le Gall, Pascale
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING (FASE 2020), 2020, 12076 : 482 - 501
  • [36] SECURITY ANALYSIS OF TCP/IP NETWORKS An Approach to Automatic Analysis of Network Security Properties
    Sveda, Miroslav
    Rysavy, Ondrej
    Matousek, Petr
    Rab, Jaroslav
    Cejka, Rudolf
    DCNET 2010/OPTICS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING AND INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATION SYSTEM, 2010, : 5 - 11
  • [37] Formal Methods for Socio-technical Security (Formal and Automated Analysis of Security Ceremonies)
    Vigano, Luca
    COORDINATION MODELS AND LANGUAGES, 2022, 13271 : 3 - 14
  • [38] A Formal Semantics for Sequence Diagrams and a Strategy for System Analysis
    Lima, Lucas
    Iyoda, Juliano
    Sampaio, Augusto
    PROCEEDINGS OF THE 2014 2ND INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2014), 2014, : 317 - 324
  • [39] A formal semantics for SPKI
    Howell, J
    Kotz, D
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 140 - 158
  • [40] ON SEMANTICS OF FORMAL REPRESENTATION
    DREHER, JH
    PHILOSOPHIA, 1978, 8 (01) : 71 - 78