A Heuristic State Space Search Model for Security Protocol Verification

نویسندگان

  • Zeeshan Furqan
  • Ratan K. Guha
  • Shahabuddin Muhammad
چکیده

The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable security protocols. E-Business can not be encouraged with susceptible underlying security protocols. We present a heuristic state space search model for automatic security protocol verification. Our model exploits its knowledge of the search space and intelligently enhances the efficiency of security protocol verification process. It uses the representation of security protocols in terms of Strand Space Model (SSM) and logic of authentication. The attributes of security protocol are first represented in SSM and then interpreted into logic. This logical module is coded in the form of states. Our model accepts these states as its input and attempts to verify them. An efficient algorithm is used for the verification procedure. The goal is to avoid state space explosion problem and improve the overall efficiency by exploring maximum number of states in a given amount of time. The simplicity of our approach enables it to be translated into existing solutions for greater efficiency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness

Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...

متن کامل

Heuristic Methods for Security Protocols

Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explor...

متن کامل

Reachability checking in complex and concurrent software systems using intelligent search methods

Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...

متن کامل

State Pruning for Generating Efficient Test Vectors

The previously proposed witness string method [2] generates traces for system verification using a model checker and then uses the traces to drive the RTL logic design simulation. This paper extends the depth first search (DFS) used in the original witness string method with a state pruning method that exploits multiple search heuristics in simultaneous searches where each DFS uses a different ...

متن کامل

Heuristics for Complexity-Effective Verification of a Cache Coherence Protocol Implementation

Verifying the correctness of a shared-memory multiprocessor cache coherence protocol, and its implementation in silicon, is an extraordinarily complex and time-consuming task. The detailed formal verification model developed for the Cray X1 cache coherence protocol, for instance, produces a search space with over 214 million reachable states. Exhaustively searching this space for errors in the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004