Security protocol vulnerability mining method based on multiple reverse cases
A security protocol and vulnerability mining technology, applied in electrical components, transmission systems, etc., can solve the problems of state space explosion, proof, no unified and accurate method, etc., to reduce workload, improve accuracy and efficiency.
Inactive Publication Date: 2019-09-03
UNIV OF ELECTRONIC SCI & TECH OF CHINA
5 Cites 12 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses a security protocol vulnerability mining method based on multiple reverse cases, which comprises the following steps: S1, modeling a security protocol required to be verified by using a promela language, and storing the security protocol in a .pml file format; S2, reducing the security property of a protocol, and expressing the security property in an LTL form; S3, verifying the security protocol in a manner of searching for an inverse example; S4, eliminating similar inverse cases, wherein an editing distance method is used for measuring a weight sequence of the inverse cases, and eliminating the similar inverse cases; then further eliminating similar reverse examples by using a method of comparing the attack path graphs; and S5, processing the residual reverse case set in the step S4 by using a statistical method. According to the method, a weight concept is introduced in a model detection stage, weight sequences in inverse cases are further compared, and similar inverse cases are eliminated. In the inverse case analysis stage, a statistical method is used for processing a large number of redundant inverse cases, so that the analysis process of the inversecases is more automatic, and the accuracy and efficiency of security protocol analysis are improved.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Device and method for inner bore type component brush plating
Owner:ACADEMY OF ARMORED FORCES ENG PLA
Microphone array, monitoring system, and sound pickup setting method
ActiveUS20170264999A1Reduce workloadWork lessTelevision system detailsMicrophonesDirectivityVoice data
Owner:PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO LTD
Teaching quality assessment cloud service platform
InactiveCN107958351AReduce workloadLarge number of samplesSemantic analysisSpeech analysisData acquisition moduleQuality assessment
Owner:重庆大争科技有限公司
Method and apparatus for filtering rubbish contents
InactiveCN101510879AWide coverageReduce workloadData switching networksMaterial resourcesSemantic analytics
Owner:TENCENT TECH (SHENZHEN) CO LTD
Method for protecting eyesight
InactiveCN102510457AReduce workloadTelevision system detailsColor television detailsComputer science
Owner:TCL KING ELECTRICAL APPLIANCES HUIZHOU
Classification and recommendation of technical efficacy words
- Reduce workload
- Improve efficiency and accuracy
Hospital gown
Owner:WILLIAM BEAUMONT HOSPITAL
Performance Aware Peer-to-Peer Content-on-Demand
ActiveUS20090177792A1Reduce workloadImproves perceive performanceMultiple digital computer combinationsTwo-way working systemsOn demandPeer-to-peer
Owner:THOMSON LICENSING SA
Method and apparatus for directionally grabbing page resource
InactiveCN101452463AIncrease yield and recallReduce workloadSpecial data processing applicationsRegular expressionDatabase
Owner:ZHEJIANG UNIV
Internet refrigerator with web pad and method for operating the same
ActiveUS7136940B2Reduce workloadInput/output for user-computer interactionComputer controlEngineeringInternet refrigerator
Owner:LG ELECTRONICS INC