Security protocol vulnerability mining method based on multiple reverse cases
A security protocol and vulnerability mining technology, applied in electrical components, transmission systems, etc., can solve the problems of state space explosion, proof, no unified and accurate method, etc., to reduce workload, improve accuracy and efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0040] This method is extended on the basis of model checking. In the process of model checking, the concept of node weight is introduced, and counter-examples are analyzed, and the information in multiple counter-examples is integrated to mine vulnerabilities in security protocols. The general idea is as follows: protocol modeling-model checking-elimination of similar counterexamples-analysis of numerous counterexamples, mining protocol vulnerabilities. The specific process diagram is as figure 1 As shown, a specific description will be given below.
[0041] A security protocol vulnerability mining method based on multiple counterexamples of the present invention includes the following steps:
[0042] S1. Use promela language to model the security protocol that needs to be verified, and save it as a .pml file format; in step S1, you first need to use promela language to model the security protocol, and the nspk protocol is used as an example for illustration. The protocol has th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap