Journal on Communications ›› 2018, Vol. 39 ›› Issue (9): 178-190.doi: 10.11959/j.issn.1000-436x.2018165

• Papers • Previous Articles    

Security analysis of security protocol Swift implementations based on computational model

Bo MENG(),Xudong HE,Jinli ZHANG,Lili YAO,Jintian LU   

  1. College of Computer Science,South Central University For Nationalities,Wuhan 430074,China
  • Revised:2018-07-23 Online:2018-09-01 Published:2018-10-19
  • Supported by:
    The National Natural Science Foundation of China(61272497);The Natural Science Foundation of Hubei Province(2014CFB249);The Natural Science Foundation of Hubei Province(2018ADC150);The Central University Basic Business Expenses Special Funding for Scientific Research Project(CZZ18003);The Central University Basic Business Expenses Special Funding for Scientific Research Project(QSZ17007)

Abstract:

Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.

Key words: security protocol, implementations security, Swift language, formal analysis, model extraction

CLC Number: 

No Suggested Reading articles found!