Uncovering attacks on security protocols

Wuu Yang*

*此作品的通信作者

研究成果: Conference contribution同行評審

1 引文 斯高帕斯(Scopus)

摘要

Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.

原文English
主出版物標題Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
頁面572-575
頁數4
DOIs
出版狀態Published - 1 12月 2005
事件3rd International Conference on Information Technology and Applications, ICITA 2005 - Sydney, 澳大利亞
持續時間: 4 7月 20057 7月 2005

出版系列

名字Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
II

Conference

Conference3rd International Conference on Information Technology and Applications, ICITA 2005
國家/地區澳大利亞
城市Sydney
期間4/07/057/07/05

指紋

深入研究「Uncovering attacks on security protocols」主題。共同形成了獨特的指紋。

引用此