首页 | 本学科首页   官方微博 | 高级检索  
     

基于Horn逻辑扩展模型的安全协议反例的自动构造
引用本文:周倜,李梦君,李舟军,陈火旺.基于Horn逻辑扩展模型的安全协议反例的自动构造[J].计算机研究与发展,2007,44(9):1518-1531.
作者姓名:周倜  李梦君  李舟军  陈火旺
作者单位:1. 国防科学技术大学计算机学院,长沙,410073
2. 北京航空航天大学计算机学院,北京,100083
摘    要:根据安全协议的Horn逻辑扩展模型和相应的安全协议验证方法,提出了自动构造不满足安全性质的安全协议反例的求解策略,并给出了重要定理的证明,设计了一系列自动构造协议攻击的构造算法,并在基于函数式编程语言Objective Caml开发的安全协议验证工具SPVT中实现了这些算法,给出了主要算法的优化方法,详细分析了主要算法的时间复杂度,从理论上证明了算法是线性时间算法.最后,用SPVT对一些典型的安全协议进行了验证,得到了不安全协议的反例,并对反例进行了分析.得到的反例非常方便于阅读,与Alice-Bob标记非常接近,从而使任何领域的专家都可以用这种形式化的方法检查安全协议是否存在真实的反例.

关 键 词:安全协议  扩展的Horn逻辑模型  形式化验证  反例  复杂性  逻辑  扩展模型  安全协议  自动  构造算法  Logic  Model  Extended  Based  Security  Protocols  存在  检查  优化方法  形式化  专家  阅读  验证工具  线性时间算法  理论  复杂度  分析
修稿时间:2006-06-05

Automatically Constructing Counter-Examples of Security Protocols Based on the Extended Horn Logic Model
Zhou Ti,Li Mengjun,Li Zhoujun,Chen Huowang.Automatically Constructing Counter-Examples of Security Protocols Based on the Extended Horn Logic Model[J].Journal of Computer Research and Development,2007,44(9):1518-1531.
Authors:Zhou Ti  Li Mengjun  Li Zhoujun  Chen Huowang
Affiliation:1. School of Computer Science, National University of Defence Technology, Changsha 410073;2.School of Computer Science and Engineering, Beihang University, Beijing 100083
Abstract:It is very important to construct counter-examples of security protocols automatically,but there are few methods to do this work.Based on the extended Horn logic model and the corresponding verification method of security protocols,the solution strategies are presented,which are used to construct automatically intuitionistic counter-examples in protocols which break the security properties.Some important theorems are proved to make sure the correctness of these solution strategies.Based on this model,a series of algorithms are designed to construct counter-examples of security protocols automatically,the optimal methods of some main algorithms are given,and their complexities are analyzed in detail.These algorithms are implemented in the verifier SPVT which is developed in the functional programming language Objective Caml.The time complexities of these algorithms are proved to be linear theoretically.Finally,some classical security protocols are verified by SPVT which presents counter-examples automatically.Those results are also discussed and some counter-examples are analyzed.The results of experiments also show that these algortithms are linear.As the form of counter-examples is very similar to Alice-Bob notations,it is very convenient to read.Therefore,this formal method can be used by experts in all fields to check if there is a real counter-example in security protocols.
Keywords:security protocol  extended Horn logic model  formal verification  counter-example  complexity
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号