Fast automatic security protocol generation
نویسندگان
چکیده
An automatic security protocol generator is described that useslogic-based heuristic rules to guide it in a backward search for suitableprotocols from protocol goals. The approach taken is unlike exist-ing automatic protocol generators which typically carry out a forwardsearch for candidate protocols from the protocol assumptions. A pro-totype generator has been built that performs well in the automaticgeneration of authentication and key exchange protocols. “In solving a problem of this sort, the grand thing is to be ableto reason backward.”—Sir Arthur Conan Doyle (Sherlock Holmes),A Study in Scarlet, 1887.
منابع مشابه
Security of ADS-B: State of the Art and Beyond
Automatic dependent surveillance-broadcast (ADSB) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures i...
متن کاملAGVI - Automatic Generation, Verification, and Implementation of Security Protocols
As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Veri cation, and Implementation of Security Protocols. With AGVI, the protocol designer inpu...
متن کاملA First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the specification of the desired security properties and the system requirements. The system requirements include a metric function which specifies the cost or overhead of protocol primitives, which defines an ordering over pr...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Computer Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2012