Cargando…

A Model Based Security Testing Method for Protocol Implementation

The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an...

Descripción completa

Detalles Bibliográficos
Autores principales: Fu, Yu Long, Xin, Xiao Long
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4106171/
https://www.ncbi.nlm.nih.gov/pubmed/25105163
http://dx.doi.org/10.1155/2014/632154
Descripción
Sumario:The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.