首页> 外文会议>International Conference on Computer Aided Verification >The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
【24h】

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

机译:SCYTHER工具:验证,伪造和安全协议分析

获取原文

摘要

With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely difficult for humans, as witnessed by the fact that many protocols were found to be flawed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct and efficient protocols, and work on concise formal logics that might allow one to easily prove that a protocol is correct in a formal model, is still ongoing. The most effective approach so far has been automated falsification or verification of such protocols with state-of-the-art tools such as ProVerif [1] or the Avispa tools [2]. These tools have shown to be effective at finding attacks on protocols (Avispa) or establishing correctness of protocols (ProVerif).
机译:随着互联网和其他开放网络的兴起,已经开发并部署了大量的安全协议,以提供安全的通信。对这种安全协议的分析已经对人类来说非常困难,如同在部署后发现许多协议都有缺陷的事实所见证。这导致了对安全协议的正式分析的研究。不幸的是,没有有效的方法来构建正确和有效的协议,并且在正式模型中可以轻松证明一个方案可以轻松证明协议的正式逻辑的工作仍然正在进行中。到目前为止,最有效的方法已经自动化或验证了这种协议,这些协议具有最先进的工具,如纤维原文[1]或AVISPA工具[2]。这些工具已经证明有效地发现对协议(AVISPA)的攻击或建立协议的正确性(箴言)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号