M. Panti, L. Spalazzi, S. Tacconi, Francesco Pagliarecci
{"title":"多协议系统的安全性模型检验","authors":"M. Panti, L. Spalazzi, S. Tacconi, Francesco Pagliarecci","doi":"10.1109/ISCST.2005.1553299","DOIUrl":null,"url":null,"abstract":"Many security protocols have been shown to have serious design flaws, even a long time after their publication. For this reason, several automatic verification methods have been proposed. As far as we know, all these methods deal with the verification of mono-protocol systems. On the contrary, modern computer systems employ different security protocols in the same environment. In this paper, we present a methodology to automatically verify the security of multiprotocol systems based on model checking. We also describe its application to a multi-protocol system composed by SET (by VISA & Mastercard) and 2KP (by IBM)","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"221 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Model checking the security of multi-protocol systems\",\"authors\":\"M. Panti, L. Spalazzi, S. Tacconi, Francesco Pagliarecci\",\"doi\":\"10.1109/ISCST.2005.1553299\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many security protocols have been shown to have serious design flaws, even a long time after their publication. For this reason, several automatic verification methods have been proposed. As far as we know, all these methods deal with the verification of mono-protocol systems. On the contrary, modern computer systems employ different security protocols in the same environment. In this paper, we present a methodology to automatically verify the security of multiprotocol systems based on model checking. We also describe its application to a multi-protocol system composed by SET (by VISA & Mastercard) and 2KP (by IBM)\",\"PeriodicalId\":283620,\"journal\":{\"name\":\"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.\",\"volume\":\"221 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCST.2005.1553299\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCST.2005.1553299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Model checking the security of multi-protocol systems
Many security protocols have been shown to have serious design flaws, even a long time after their publication. For this reason, several automatic verification methods have been proposed. As far as we know, all these methods deal with the verification of mono-protocol systems. On the contrary, modern computer systems employ different security protocols in the same environment. In this paper, we present a methodology to automatically verify the security of multiprotocol systems based on model checking. We also describe its application to a multi-protocol system composed by SET (by VISA & Mastercard) and 2KP (by IBM)