Rule-based Programs Describing Internet Security Protocols
نویسندگان
چکیده
We present a low-level specification language used for describing real Internet security protocols. Specifications are automatically generated by a compiler, from TLA-based high-level descriptions of the protocols. The results are rule-based programs containing all the information needed for either implementing the protocols, or verifying some security properties. This approach has already been applied to several well-known Internet security protocols, and the generated programs have been successfully used for finding some attacks.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Formal Framework for Secure Routing Protocols
The Internet infrastructure, as it stands today, is highly vulnerable to attacks. The Internet runs the Border Gateway Protocol (BGP), where routers are grouped into Autonomous Systems (ASes) administered by Internet Service Providers (ISPs). Since route advertisements are not authenticated, ASes can, for example, advertise nonexistent routes or claim to own arbitrary destination addresses. In ...
متن کاملBuilding Security-Aware Applications on Celestial Network Security Management Infrastructure
Heterogeneous and distributed nature of the Internet makes it very diicult to customize security protocols and policies in order to satisfy the security needs of applications. Celestial network security management project addresses this issue through building an infrastructure that can dynamically set up inter-domain secure communication channels upon the requests of applications. Celestial Sys...
متن کاملDissertation : Incremental Maintenance of Recursive Views with Applications to Tabled Logic Programming
Vulnerability analysis using dynamic attack graphs, dynamic binary analysis for mobile code security, incre-mental bisimulation algorithm. Development of algorithms for incremental evaluation of tabled logic programs and its application to program analysis, generation and analysis of multiple counterexamples for error cause localization, model checking security-relevant properties of sequential...
متن کاملGuest Lecturer . Principles of Programming Language
Vulnerability analysis using dynamic attack graphs, dynamic binary analysis for mobile code security, incre-mental bisimulation algorithm. Development of algorithms for incremental evaluation of tabled logic programs and its application to program analysis, generation and analysis of multiple counterexamples for error cause localization, model checking security-relevant properties of sequential...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Electr. Notes Theor. Comput. Sci.
دوره 124 شماره
صفحات -
تاریخ انتشار 2005