Compiling symbolic attacks to protocol implementation tests

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compiling symbolic attacks to protocol implementation tests

Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementati...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Executable and Symbolic Conformance Tests for Implementation Models

Following the Model-Driven Architecture (MDA), a system description consists of several models, i.e. views of the system. This paper is concerned with formal conformance tests between different models. It stresses the need for formal semantical foundations of all languages that are used to express models. In particular, we classify conformance tests for implementation models. The Model-Driven A...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Compiling an Honest but Curious Protocol

In previous lectures, the notion of secure multiparty computing was developed. The setting is that there are m parties, each of which has a private input x1, . . . , xm. The goal is to compute f(x1, . . . , xm, R) securely, where R is random coins and “securely” means that no party obtains any more knowledge about other parties’ private inputs than could be obtained if all computation were done...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science

سال: 2013

ISSN: 2075-2180

DOI: 10.4204/eptcs.122.4