Method and device for achieving safety testing on protocol implementation

A technology for protocol implementation and security testing, applied in the field of information security, can solve problems such as difficult optimization and improvement, time-consuming, and high cost of black-box testing

Active Publication Date: 2013-04-10
SIEMENS AG
View PDF3 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the implementation cost of black-box testing is very high, it is also very time-consuming, and it is difficult to optimize and improve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for achieving safety testing on protocol implementation
  • Method and device for achieving safety testing on protocol implementation
  • Method and device for achieving safety testing on protocol implementation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0076] The embodiment of the present invention proposes a method for security testing of Protocol Implementation. When testing a protocol implementation, the processing flow of this method is as follows figure 1 Shown include the following steps:

[0077] Step 101: Map the protocol specification on which the protocol implementation is based to a first protocol state model (also referred to as an initial protocol state model).

[0078] Step 102: Introduce an illegal state into this first protocol state model to form a second protocol state model.

[0079] Step 103: Use assertions to characterize the test target of the second protocol state model and / or the first protocol state model, and use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for achieving safety testing on protocol implementation. The method includes: mopping protocol specifications into a first protocol state model; leading illegal state into the first protocol state model to form a second protocol state model; representing testing aims of the first protocol state model / the second protocol state model through assertions, and representing grammar rules of the messages input legally through grammar constrains; performing behavior mutation operations on the second protocol state model to generate a variant protocol state model and performing model detection, and using the obtained counter example mapping violating the assertions as a testing sequence; performing grammar mutation operations on the testing sequence to generate the testing sequence containing the variant testing messages, and using the testing sequence containing effective variant messages as a testing case; and using the testing case to perform muzzy testing on protocol implementation to detect the security holes in the protocol implementation. By means of an embodiment of the method and device for achieving safety testing on the protocol implementation, safety testing of the protocol can be achieved efficiently with low cost.

Description

technical field [0001] The invention relates to the technical field of information security (Information Security), in particular to a method and device for performing security testing on protocol implementation. Background technique [0002] Computer information security technology is a computer comprehensive application discipline composed of cryptography application technology, information security technology, data disaster and data recovery technology, operating system maintenance technology, etc. Among them, information security technology is mainly used to prevent system vulnerabilities, prevent external hackers from invading, defend against virus damage, and effectively control suspicious access. [0003] With the development of the Internet (Internet), it is urgent to strengthen its information security technology in various computer systems. Take the Information Communication Technology (ICT, Information Communication Technology) system as an example. As a service...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
CPCG06F11/3684
Inventor 唐文
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products