首页 | 本学科首页   官方微博 | 高级检索  
     

注入攻击序列搜索算法对安全协议的验证研究
引用本文:韩进,谢俊元.注入攻击序列搜索算法对安全协议的验证研究[J].计算机科学与探索,2010,4(7):608-616.
作者姓名:韩进  谢俊元
作者单位:南京大学,计算机软件新技术国家重点实验室,南京,210093
基金项目:The National Natural Science Foundation of China under Grant No.60373064,the National High-Tech Research and Development Plan of China under Grant No.2003AA144020(国家高技术研究发展计划 
摘    要:通过对D-Y攻击者模型研究,可知注入攻击是攻击者实现其攻击目标的必要手段。对注入攻击序列的性质进行分析,提出了一种在安全协议会话状态空间中搜索注入攻击序列的算法,基于该算法可实现一种新的安全协议验证方法。利用该方法实现了NS公钥协议的验证。实验表明该方法可以实现对安全协议的自动化验证,降低了验证的复杂度,并能给出安全协议漏洞的具体攻击方法。

关 键 词:安全协议  验证分析  注入攻击序列
修稿时间: 

Application Research of Inject Attack Sequence Searching Algorithm for Security Protocol Verification
HAN Jin,XIE Junyuan.Application Research of Inject Attack Sequence Searching Algorithm for Security Protocol Verification[J].Journal of Frontier of Computer Science and Technology,2010,4(7):608-616.
Authors:HAN Jin  XIE Junyuan
Affiliation:State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China
Abstract:It is concluded that the inject attack is the necessary method for D-Y attacker to get its aim. Based on the analysis of the inject attack sequence, an inject attack searching algorithm is presented, and a new security protocol verification approach, which based on the algorithm, is also presented. The NS protocol is verified by the approach in the paper, and the experiment shows that the approach can realize automatic security protocol verification, reduce the complexity of security protocol verification, and give attack ways according to the protocol flaws.
Keywords:security protocol  verification  inject attack sequence
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机科学与探索》浏览原始摘要信息
点击此处可从《计算机科学与探索》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号