通信学报 ›› 2017, Vol. 38 ›› Issue (10): 175-188.doi: 10.11959/j.issn.1000-436x.2017208

• 学术通信 • 上一篇    

SSMCI:以攻击者为中心的安全协议验证机制

谷文,韩继红,袁霖   

  1. 解放军信息工程大学三院,河南 郑州 450004
  • 修回日期:2017-06-06 出版日期:2017-10-01 发布日期:2017-11-16
  • 作者简介:谷文(1992-),男,湖南耒阳人,解放军信息工程大学硕士生,主要研究方向为安全协议形式化分析与自动化验证。|韩继红(1966-),女,山西定襄人,博士,解放军信息工程大学教授、博士生导师,主要研究方向为网络与信息安全、安全协议形式化分析与自动化验证。|袁霖(1981-),男,河南商丘人,博士,解放军信息工程大学副教授,主要研究方向为安全协议形式化分析与自动化验证、软件可信性分析。
  • 基金资助:
    国家自然科学基金资助项目(1309018)

SSMCI:verification mechanism for security protocols centered on the attacker

Wen GU,Ji-hong HAN,Lin YUAN   

  1. The Third College,PLA Information Engineering University,Zhengzhou 450004,China
  • Revised:2017-06-06 Online:2017-10-01 Published:2017-11-16
  • Supported by:
    The National Natural Science Foundation of China(1309018)

摘要:

提出一种能对安全协议进行分析的自动化验证机制。提出需求的概念,认为需求是攻击者未知但又对攻击者合成目标项至关重要的知识集合,并建立了以需求为中心的攻击者模型;设计一种以攻击者为中心的状态搜索方式,按需添加协议会话实例,为避免新增协议会话实例引起攻击者推理出现时序矛盾,引入回溯机制以确保状态转移过程中攻击者知识能正确增长。实验表明,该系统能正确验证协议的安全性,状态空间数目略优于Scyther工具。

关键词: 安全协议, 攻击者模型, 状态扩展

Abstract:

A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.

Key words: security protocol, attacker model, state expansion

中图分类号: 

No Suggested Reading articles found!