Security protocol code vulnerability mining method based on state machine consistency detection

A security protocol and state machine technology, applied in the field of information security, can solve the problems of professional requirements and low efficiency of personnel prone to false detection and debugging, and achieve the effect of enhancing universality, improving analysis efficiency and high accuracy.

Active Publication Date: 2020-12-29
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of this invention is to provide a security protocol code vulnerability mining method based on state machine consistency detection, which is used to solve the problem of low efficiency and error proneness of existing methods. Detection and problems requiring high professionalism of debuggers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protocol code vulnerability mining method based on state machine consistency detection
  • Security protocol code vulnerability mining method based on state machine consistency detection
  • Security protocol code vulnerability mining method based on state machine consistency detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0039] This embodiment proposes a security protocol code vulnerability mining method based on state machine consistency detection. The overall process framework of the method is as follows figure 2 As shown, the basic steps are as follows:

[0040] Step 1, for a security protocol implementation device, send a test case to it, use the learning algorithm in the state machine inference learning machine to deduce the state machine model of the protocol implementation, that is, the protocol model state diagram;

[0041] Step 2, use the model mapping method to translate the state machine model implemented by the protocol into a formalized model as an input model for consistency detection, for example, formally describe the state machine model as an SMV language model;

[0042] Step 3, based on the relevant security protocol specifications, use l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security protocol code vulnerability mining method based on state machine consistency detection, and belongs to the technical field of information security, and the method comprises the steps: carrying out the interaction with a device carrying a target security protocol in a mode of transmitting a test case, and deducing a state machine model of the security protocol through a learning machine; translating the state machine model into a formalized model, comparing the formalized model with a set formalized verification criterion, searching for the situation that theformalized model is inconsistent with the criterion in the state machine model, and giving out a counter example for debugging personnel to refer to. According to the method, a formal verification means is utilized to automatically detect the compliance condition of the protocol state machine, the conventional manual screening is fundamentally replaced, the analysis efficiency of the protocol state machine is improved, the accuracy is high, false detection is not likely to happen, the professional requirement of debugging personnel is lowered, the universality of the analysis method is enhanced, and even problems which are difficult to find by manual analysis can be found.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security protocol code vulnerability mining method based on state machine consistency detection. Background technique [0002] In recent years, with the continuous development of global informatization, a large number of network security protocols have been applied to secure and confidential communications, aiming to provide secure communication guarantees for people's production and life. The information security situation is becoming more and more serious, and the vulnerability analysis of network security protocols has become a hot spot in the field of information security. At present, among many network security problems, some loopholes are caused by incorrect implementation of relevant protocol specifications, such as OpenSSL Early CCS loopholes, OpenSSH user enumeration loopholes, etc. These subtle logic loopholes are often difficult to find, but ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06F9/448G06F21/57
CPCH04L63/0485H04L63/06G06F9/4498G06F21/577H04L9/0838
Inventor 顾纯祥郭家兴石雅男陈熹
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products