首页> 外文OA文献 >An interpolation-based method for the verification of security protocols
【2h】

An interpolation-based method for the verification of security protocols

机译:基于插值的安全协议验证方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Interpolation has been successfully applied in formal methods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct application of interpolation. We address this problem and present an interpolation-based method for security protocol verification. Our method starts from a protocol specification and combines Craig interpolation, symbolic execution and the standard Dolev-Yao intruder model to search for possible attacks on the protocol. Interpolants are generated as a response to search failure in order to prune possible useless traces and speed up the exploration. We illustrate our method by means of concrete examples and discuss the results obtained by using a prototype implementation.
机译:插值已成功应用于形式化方法中,用于顺序程序的模型检查和测试用例生成。但是,安全协议表现出这种特质,使其不适合直接应用插值。我们解决了这个问题,并提出了一种基于插值的安全协议验证方法。我们的方法从协议规范开始,并结合了Craig插值,符号执行和标准Dolev-Yao入侵者模型,以搜索对协议的可能攻击。生成插值作为对搜索失败的响应,以修剪可能的无用痕迹并加快搜索速度。我们通过具体示例说明我们的方法,并讨论通过使用原型实现获得的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号