Cargando…

A Model Based Security Testing Method for Protocol Implementation

The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an...

Descripción completa

Detalles Bibliográficos
Autores principales: Fu, Yu Long, Xin, Xiao Long
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4106171/
https://www.ncbi.nlm.nih.gov/pubmed/25105163
http://dx.doi.org/10.1155/2014/632154
_version_ 1782327484895723520
author Fu, Yu Long
Xin, Xiao Long
author_facet Fu, Yu Long
Xin, Xiao Long
author_sort Fu, Yu Long
collection PubMed
description The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
format Online
Article
Text
id pubmed-4106171
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41061712014-08-07 A Model Based Security Testing Method for Protocol Implementation Fu, Yu Long Xin, Xiao Long ScientificWorldJournal Research Article The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. Hindawi Publishing Corporation 2014 2014-07-06 /pmc/articles/PMC4106171/ /pubmed/25105163 http://dx.doi.org/10.1155/2014/632154 Text en Copyright © 2014 Y. L. Fu and X. L. Xin. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Fu, Yu Long
Xin, Xiao Long
A Model Based Security Testing Method for Protocol Implementation
title A Model Based Security Testing Method for Protocol Implementation
title_full A Model Based Security Testing Method for Protocol Implementation
title_fullStr A Model Based Security Testing Method for Protocol Implementation
title_full_unstemmed A Model Based Security Testing Method for Protocol Implementation
title_short A Model Based Security Testing Method for Protocol Implementation
title_sort model based security testing method for protocol implementation
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4106171/
https://www.ncbi.nlm.nih.gov/pubmed/25105163
http://dx.doi.org/10.1155/2014/632154
work_keys_str_mv AT fuyulong amodelbasedsecuritytestingmethodforprotocolimplementation
AT xinxiaolong amodelbasedsecuritytestingmethodforprotocolimplementation
AT fuyulong modelbasedsecuritytestingmethodforprotocolimplementation
AT xinxiaolong modelbasedsecuritytestingmethodforprotocolimplementation