Cargando…
A Model Based Security Testing Method for Protocol Implementation
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4106171/ https://www.ncbi.nlm.nih.gov/pubmed/25105163 http://dx.doi.org/10.1155/2014/632154 |
_version_ | 1782327484895723520 |
---|---|
author | Fu, Yu Long Xin, Xiao Long |
author_facet | Fu, Yu Long Xin, Xiao Long |
author_sort | Fu, Yu Long |
collection | PubMed |
description | The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. |
format | Online Article Text |
id | pubmed-4106171 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-41061712014-08-07 A Model Based Security Testing Method for Protocol Implementation Fu, Yu Long Xin, Xiao Long ScientificWorldJournal Research Article The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. Hindawi Publishing Corporation 2014 2014-07-06 /pmc/articles/PMC4106171/ /pubmed/25105163 http://dx.doi.org/10.1155/2014/632154 Text en Copyright © 2014 Y. L. Fu and X. L. Xin. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Fu, Yu Long Xin, Xiao Long A Model Based Security Testing Method for Protocol Implementation |
title | A Model Based Security Testing Method for Protocol Implementation |
title_full | A Model Based Security Testing Method for Protocol Implementation |
title_fullStr | A Model Based Security Testing Method for Protocol Implementation |
title_full_unstemmed | A Model Based Security Testing Method for Protocol Implementation |
title_short | A Model Based Security Testing Method for Protocol Implementation |
title_sort | model based security testing method for protocol implementation |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4106171/ https://www.ncbi.nlm.nih.gov/pubmed/25105163 http://dx.doi.org/10.1155/2014/632154 |
work_keys_str_mv | AT fuyulong amodelbasedsecuritytestingmethodforprotocolimplementation AT xinxiaolong amodelbasedsecuritytestingmethodforprotocolimplementation AT fuyulong modelbasedsecuritytestingmethodforprotocolimplementation AT xinxiaolong modelbasedsecuritytestingmethodforprotocolimplementation |